Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14

MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction

Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors

Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Authors: Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella | Published: 2021-12-12

Malware Classification Using Static Disassembly and Machine Learning

Authors: Zhenshuo Chen, Eoin Brophy, Tomas Ward | Published: 2021-12-10

On the Security & Privacy in Federated Learning

Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16

Automated Side Channel Analysis of Media Software with Manifold Learning

Authors: Yuanyuan Yuan, Qi Pang, Shuai Wang | Published: 2021-12-09 | Updated: 2021-12-10

ESAFE: Enterprise Security and Forensics at Scale

Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08

Membership Inference Attacks From First Principles

Authors: Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramer | Published: 2021-12-07 | Updated: 2022-04-12